Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The AEX Method and Its Instrumentation., , and . ICEIS, page 473-481. (2002)Experience Management in the Work of Public Organizations: The Pellucid Project., , , and . ICEIS (2), page 438-441. (2003)Safeguards in a World of Ambient Intelligence (SWAMI), , , , , , , , , and 5 other author(s). (2006)Model of Experience for Public Organisations with Staff Mobility., , , , , , , , , and 5 other author(s). KMGov, volume 3035 of Lecture Notes in Computer Science, page 91-100. Springer, (2004)Knowledge Management by Reusing Experience (Short Paper)., and . EKAW, volume 1937 of Lecture Notes in Computer Science, page 304-311. Springer, (2000)Knowledge Management for Organisationally Mobile Public Employees., , , , , , , , , and 6 other author(s). KMGov, volume 2645 of Lecture Notes in Computer Science, page 203-212. Springer, (2003)Risk Management approach on identity theft in biometric systems context.. ARES, page 982. IEEE Computer Society, (2006)Leveraging Crowdsourcing and Crowdsensing Data for HADR Operations in a Smart City Environment., , , and . IEEE Internet Things Mag., 2 (2): 26-31 (2019)